Update: only need to delete lockdown folder.
I tried a few thing to see what would cause iTunes to prompt for an iOS device's passcode despite already having synced with each other in the past.
This information is most likely not important to most users, including myself, given their requirements in terms of data security but it may be useful for some.
- Changing the passcode after each sync does not cause iTunes to prompt for the iOS device's passcode so the function of the escrow keys is not tied to the passcode.
- Deauthorizing iTunes does not cause iTunes to prompt for the iOS device's passcode to allow syncing the device so the Apple ID is not involved in the process as well.
- Currently, FileVault does not appear to encrypt this folder. This will not be an issue with FileVault in Mac OS X Lion as it will support full disk encryption. Interestingly, it was sometime last year that the lockdown folder was moved from ~/Library/Lockdown to /private/var/db/lockdown. The old location is in an area of the system encrypted by FileVault. Was this an oversight by Apple?
- I suspect access to iTunes is not required given an independent tool was developed to bypass the encryption so no combination that includes deleting or limiting access to iTunes without also deleting the contents of the lockdown folder is effective. Deleting iTunes also most likely does not provide any benefit.
- Encrypting the iOS device's backup has no impact on the lockdown folder but increases security in other ways unrelated to the escrow keys issue.
- As suggested by blackboxxx, deleting the lockdown folder does cause iTunes to prompt the user to enter the iOS device passcode; after which, syncing the device causes the contents of the lockdown folder to be recreated.
- The contents of the lockdown folder only appear to be related to the syncing of iOS devices. The contents can be deleted without issue and are recreated each time you sync the iOS device.
So, a combination of using a secure passcode and deleting the contents of the lockdown folder after each sync can mitigate access to the user's data via the method described in the original post.
Also, it would be trivial to produce a simple app using Automator that would move the contents of the lockdown folder to the trash when run after each syncing of the iOS device.
Admittedly, I don't think this is an issue that users should have to worry about. What if both your computer and iOS device were stolen at the same time? Of course, this is dependent on this method becoming more known in detail than it is at the moment.